Contents
Academic literature on the topic 'Host impersonation'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Host impersonation.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Host impersonation"
Dandotiya, Monika. "A Secure Detection Framework for ARP, DHCP, and DoS Attacks on Kali Linux." International Journal for Research in Applied Science and Engineering Technology 10, no. 7 (2022): 3044–53. http://dx.doi.org/10.22214/ijraset.2022.42176.
Full textPrabadevi, B., and N. Jeyanthi. "Security Solution for ARP Cache Poisoning Attacks in Large Data Centre Networks." Cybernetics and Information Technologies 17, no. 4 (2017): 69–86. http://dx.doi.org/10.1515/cait-2017-0042.
Full textKhalid, Haqi, Shaiful Jahari Hashim, Sharifah Mumtazah Syed Ahmad, Fazirulhisyam Hashim, and Muhammad Akmal Chaudhary. "Cross-SN: A Lightweight Authentication Scheme for a Multi-Server Platform Using IoT-Based Wireless Medical Sensor Network." Electronics 10, no. 7 (2021): 790. http://dx.doi.org/10.3390/electronics10070790.
Full textAYO-OLADAPO, ESTHER OLAJUMOKE, and John Ayo Oladapo. "Parenting Education As A Vital Tool For Sustaining Green Skills Among Youths For Nation Building." Shodh Sari-An International Multidisciplinary Journal 02, no. 04 (2023): 207–21. http://dx.doi.org/10.59231/sari7635.
Full textDr., Harish Joshi, Ashok Bawge Prof., Uzma Kausar Prof., Ladde Akash, Jadhav Rohan, and Dani Rajrajeshwari. "A Decentralized Security Strategy to Counter ARP Cache Poisoning Attacks." Advancement and Research in Instrumentation Engineering 8, no. 2 (2025): 6–12. https://doi.org/10.5281/zenodo.15542613.
Full textIlham Firdaus, Januar Al Amien, and Soni Soni. "String Matching untuk Mendeteksi Serangan Sniffing (ARP Spoofing) pada IDS Snort." Jurnal CoSciTech (Computer Science and Information Technology) 1, no. 2 (2020): 44–49. http://dx.doi.org/10.37859/coscitech.v1i2.2180.
Full textMahmood, Baban Ahmed, Aso Ahmed Majeed, and Ahmed Chalak Shakir. "An end to end key establishment scheme for detecting black hole attacks in mobile ad hoc networks." Indonesian Journal of Electrical Engineering and Computer Science 21, no. 2 (2021): 1193. http://dx.doi.org/10.11591/ijeecs.v21.i2.pp1193-1200.
Full textMahmood, Baban Ahmed, Aso Ahmed Majeed, and Ahmed Chalak Shakir. "An end to end key establishment scheme for detecting black hole attacks in mobile ad hoc networks." Indonesian Journal of Electrical Engineering and Computer Science 21, no. 2 (2021): 1193–200. https://doi.org/10.11591/ijeecs.v21.i2.pp1193-1200.
Full textArkhangelskaya, Irina. "Donald Trump in US Show Saturday Night Live (1988-2022)." Theoretical and Practical Issues of Journalism 11, no. 3 (2022): 545–63. http://dx.doi.org/10.17150/2308-6203.2022.11(3).545-563.
Full textBoler, Megan. "The Transmission of Political Critique after 9/11: “A New Form of Desperation”?" M/C Journal 9, no. 1 (2006). http://dx.doi.org/10.5204/mcj.2595.
Full textBook chapters on the topic "Host impersonation"
Si, Huayin, and Chang-Tsun Li. "Copyright Protection in Virtual Communities through Digital Watermarking." In Information Security and Ethics. IGI Global, 2008. http://dx.doi.org/10.4018/978-1-59904-937-3.ch257.
Full textSi, Huayin, and Chang-Tsun Li. "Copyright Protection in Virtual Communities through Digital Watermarking." In Virtual Technologies. IGI Global, 2008. http://dx.doi.org/10.4018/978-1-59904-955-7.ch098.
Full text